Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12336: SQL Injection in Campcodes Retro Basketball Shoes Online Store

0
Medium
VulnerabilityCVE-2025-12336cvecve-2025-12336
Published: Tue Oct 28 2025 (10/28/2025, 00:02:07 UTC)
Source: CVE Database V5
Vendor/Project: Campcodes
Product: Retro Basketball Shoes Online Store

Description

A vulnerability was identified in Campcodes Retro Basketball Shoes Online Store 1.0. Affected by this issue is some unknown functionality of the file /admin/admin_index.php. Such manipulation of the argument Username leads to sql injection. The attack can be launched remotely. The exploit is publicly available and might be used.

AI-Powered Analysis

AILast updated: 11/04/2025, 03:30:33 UTC

Technical Analysis

CVE-2025-12336 identifies a SQL injection vulnerability in the Campcodes Retro Basketball Shoes Online Store version 1.0, specifically within the /admin/admin_index.php file. The vulnerability arises from improper sanitization of the Username parameter, allowing an attacker to inject malicious SQL queries remotely without requiring authentication or user interaction. This can lead to unauthorized access or modification of the backend database, potentially exposing sensitive customer data or enabling further compromise of the application. The vulnerability has a CVSS 4.0 base score of 6.9, reflecting a medium severity level due to its remote exploitability and lack of required privileges, but limited impact on confidentiality, integrity, and availability (all rated low). Although no active exploitation has been observed, a public exploit exists, increasing the risk of attack. The lack of patches or vendor advisories necessitates immediate defensive measures. The vulnerability affects only version 1.0 of the product, indicating that upgrading or patching could mitigate the risk. The attack vector is network-based with low attack complexity and no prerequisites, making it accessible to a wide range of attackers.

Potential Impact

For European organizations using the Campcodes Retro Basketball Shoes Online Store platform, this vulnerability could result in unauthorized data access, including customer personal and payment information, leading to privacy breaches and potential regulatory penalties under GDPR. Integrity of the database could be compromised, allowing attackers to alter product listings, prices, or transaction records, which could disrupt business operations and damage reputation. Availability impact is limited but possible if attackers execute destructive SQL commands. Retailers relying on this platform may face financial losses, customer trust erosion, and legal consequences. The presence of a public exploit increases the likelihood of opportunistic attacks, especially targeting smaller retailers with limited security resources. The vulnerability's remote exploitability without authentication makes it a significant risk for online stores operating in Europe, where e-commerce is a critical sector.

Mitigation Recommendations

1. Immediate code review and remediation to properly sanitize and validate the Username parameter in /admin/admin_index.php, employing parameterized queries or prepared statements to prevent SQL injection. 2. Deploy Web Application Firewalls (WAFs) configured to detect and block SQL injection patterns targeting the affected endpoint. 3. Monitor application logs and network traffic for unusual or suspicious SQL queries or access attempts to the admin interface. 4. Restrict access to the /admin/ directory through IP whitelisting or VPN-only access to reduce exposure. 5. Conduct security assessments and penetration testing on the e-commerce platform to identify and remediate similar vulnerabilities. 6. Engage with the vendor for official patches or updates; if unavailable, consider migrating to a more secure platform. 7. Educate development and operations teams on secure coding practices and input validation to prevent future injection flaws. 8. Implement regular backups and incident response plans to quickly recover from potential compromises.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-27T12:41:34.030Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69000cd9ba6dffc5e21dd5b8

Added to database: 10/28/2025, 12:22:49 AM

Last enriched: 11/4/2025, 3:30:33 AM

Last updated: 12/13/2025, 7:56:08 AM

Views: 143

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats